Wireless Security End-to-end
30%
off

Wireless Security End-to-end

2.5 (2 ratings by Goodreads)
By (author)  , By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 4 business days
When will my order arrive?

Description

"Wireless Security End to End" is a comprehensive guide covering encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strategies for developing a wireless security solution and a look ahead at future biometric technology all in the "End to End" series targeted at real-world professionals. "Wireless Security End to End" is being done in the "End to End" series, a new series dedicated to cutting-edge technologies designed to provide proven solutions, real-world tips and best practices. The "End to End" series takes a no "techno-babble" modular approach in explaining cutting edge wireless technology. Special features include case studies, real-life implementations and wireless decision tree.show more

Product details

  • Paperback | 360 pages
  • 187.96 x 231.14 x 20.32mm | 521.63g
  • John Wiley & Sons Inc
  • Hungry Minds Inc,U.S.
  • Indianapolis, IN, United States
  • English
  • 1. Auflage
  • Ill.
  • 0764548867
  • 9780764548864

About Brian Carter

BRIAN CARTER, CISSP, CSSA--1, is a former intelligence analyst for both the military and law enforcement who currently works as an Information Protection Analyst for NatCity Investments, handling firewalls, intrusion detection systems, cryptography, and security architecture. RUSSELL SHUMWAY, CISSP, is a Principal Consultant at Guardent. He was previously the Technical Director of Global Integrity Corporation's REACT program, where he provided incident response services for clients worldwide. Russell is the coauthor of Incident Response.show more

Back cover copy

* A Practical Guide for IT Professionals * Comprehensive "End-to-End" Coverage * Real-World Perspectives, Strategies, and Solutions The growth of 802.11b wireless LANs and other wireless technologies-including Bluetooth and WAP-has opened up a whole new frontier in network security. This practical, hands-on guide leads you through the wilderness of competing wireless security solutions-and shows you how to determine the best mix of security components for your organization. Covering everything from intrusion protection and detection to VPNs, event correlation, encryption, antenna placement, and the pros and cons of specific wireless security models, it's all you need to settle on the right wireless security plan-and get it implemented. Lock Down Wireless Networks * Understand the five typical wireless security threats * Discover how network security impacts wireless security, from intrusion protection and detection to host-based security, VPNs, and event correlation * Get the scoop on wireless security components-WEP and other built-in WLAN features, authentication, encryption, and device placement * Find out how to integrate wireless into the network security process, from event logging and policies to assessments and change control * Get detailed advice on implementing specific solutions-LEAP, RADIUS, and an IPSEC VPN client * Learn how to secure public wireless networks in a cafE or kiosk and implement secure point-to-point connections for remote or branch offices Your Hands-on Guide to the Wireless Futureshow more

Review quote

"...this book has convinced me..." (Communications News, February 2003)show more

Table of contents

Preface. Part I: Introduction to Wireless Network Security. Chapter 1: Introduction to Wireless Networking. Chapter 2: Wireless Threat Analysis. Chapter 3: Behind the Threat. Part II: Network Security Components. Chapter 4: The Network Security Model. Chapter 5: Network Intrusion Protection. Chapter 6: Network Intrusion Detection. Chapter 7: Host--Based Security. Chapter 8: Virtual Private Networking. Chapter 9: Event Correlation. Part III: Wireless Security Components. Chapter 10: Secure Configuration. Chapter 11: Secure Authentication. Chapter 12: Encryption. Chapter 13: Wireless Device Placement. Part IV: Integrating Wireless Access into the Network Security Process. Chapter 14: Logging Wireless Events. Chapter 15: Policy Issues. Chapter 16: Assessing Wireless Network Security. Chapter 17: Change Control and Device Administration. Part V: Wireless Security Models. Chapter 18: Cisco Implementation with LEAP. Chapter 19: WLAN Authentication and Key Management with RADIUS. Chapter 20: Wireless Access with IPSEC. Chapter 21: Secure Wireless Public Access. Chapter 22: Secure Wireless Point--to--Point Connectivity. Appendix A: Glossary of Terms. Appendix B: Web Site References. Index.show more

Review Text

"...this book has convinced me..." ( Communications News , February 2003)show more

Rating details

2 ratings
2.5 out of 5 stars
5 0% (0)
4 0% (0)
3 50% (1)
2 50% (1)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X